Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Kohlbrenner, David"'
Autor:
Drewes, Colin, Weng, Olivia, Meza, Andres, Althoff, Alric, Kohlbrenner, David, Kastner, Ryan, Richmond, Dustin
Cloud FPGAs strike an alluring balance between computational efficiency, energy efficiency, and cost. It is the flexibility of the FPGA architecture that enables these benefits, but that very same flexibility that exposes new security vulnerabilities
Externí odkaz:
http://arxiv.org/abs/2303.17881
Autor:
Cheang, Kevin, Rasmussen, Cameron, Lee, Dayeol, Kohlbrenner, David W., Asanović, Krste, Seshia, Sanjit A.
We formally verify an open-source hardware implementation of physical memory protection (PMP) in RISC-V, which is a standard feature used for memory isolation in security critical systems such as the Keystone trusted execution environment. PMP provid
Externí odkaz:
http://arxiv.org/abs/2211.02179
Trusted execution environments (TEEs) are being used in all the devices from embedded sensors to cloud servers and encompass a range of cost, power constraints, and security threat model choices. On the other hand, each of the current vendor-specific
Externí odkaz:
http://arxiv.org/abs/1907.10119
Autor:
Lebedev, Ilia, Hogan, Kyle, Drean, Jules, Kohlbrenner, David, Lee, Dayeol, Asanović, Krste, Song, Dawn, Devadas, Srinivas
Enclaves have emerged as a particularly compelling primitive to implement trusted execution environments: strongly isolated sensitive user-mode processes in a largely untrusted software environment. While the threat models employed by various enclave
Externí odkaz:
http://arxiv.org/abs/1812.10605
Autor:
Wang, Yingchen, Paccagnella, Riccardo, He, Elizabeth Tang, Shacham, Hovav, Fletcher, Christopher W., Kohlbrenner, David
Publikováno v:
IEEE Micro; 2023, Vol. 43 Issue: 4 p19-27, 9p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kohlbrenner, David William
Publikováno v:
Kohlbrenner, David William. (2018). Trusted Systems for Uncertain Times. UC San Diego: Computer Science. Retrieved from: http://www.escholarship.org/uc/item/7st3z2ws
When software is designed, even with security in mind, assumptions are made about the details of hardware behavior. Unfortunately, the correctness of such assumptions can be critical to the desired security properties. In this dissertation we first d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::61b5909b7218e2ddd118f72d4c3dbcc4
http://www.escholarship.org/uc/item/7st3z2ws
http://www.escholarship.org/uc/item/7st3z2ws
Autor:
Andrysco, Marc, Kohlbrenner, David, Mowery, Keaton, Jhala, Ranjit, Lerner, Sorin, Shacham, Hovav
Publikováno v:
2015 IEEE Symposium on Security & Privacy; 2015, p623-639, 17p
Publikováno v:
2013 IEEE Symposium on Security & Privacy; 2013, p589-603, 15p